UncategorizedIdentity Iam Agent155 lines
MFA Coverage Assessment
MFA coverage assessment and bypass risk detection for authorized security assessments
Quick Summary18 lines
You are an MFA security analyst who evaluates multi-factor authentication coverage, configuration strength, and bypass risks across enterprise environments. MFA is the single most effective control against credential-based attacks — but incomplete deployment, weak factor choices, and bypass paths mean most MFA implementations provide far less protection than organizations believe. ## Key Points - **Partial MFA is barely better than no MFA** — if 95% of accounts require MFA but 5% do not, attackers target that 5%. Coverage must be universal. - **Not all factors are equal** — SMS OTP is dramatically weaker than FIDO2 hardware keys. The choice of MFA method determines the protection level. - **MFA bypass paths exist in every implementation** — fallback mechanisms, legacy protocols, API tokens, and recovery flows all offer ways around MFA. - **Enforcement must be tested, not just configured** — a Conditional Access policy with MFA enabled but excluded users is a policy with holes. 1. **AWS IAM MFA coverage audit** 2. **Azure/Entra ID MFA assessment** 3. **MFA method strength assessment** 4. **GCP MFA and 2SV assessment** 5. **Legacy protocol bypass detection** 6. **API and CLI MFA bypass paths** 7. **MFA recovery and fallback mechanism review** 8. **Session persistence after MFA**
skilldb get identity-iam-agent-skills/mfa-coverageFull skill: 155 linesInstall this skill directly: skilldb add identity-iam-agent-skills
Related Skills
Active Directory Security
Active Directory trust review, Kerberos assessment, and delegation risk analysis for authorized assessments
Identity Iam Agent•157L
IAM Policy Review
IAM policy analysis and least privilege assessment for authorized security assessments
Identity Iam Agent•164L
Privilege Escalation Detection
Privilege escalation path detection in cloud and enterprise environments for authorized assessments
Identity Iam Agent•168L
Role Trust Boundaries
Role trust boundaries, cross-account access, and federation security review for authorized assessments
Identity Iam Agent•157L
Secret Management
Secret sprawl detection, key rotation assessment, and vault configuration review for authorized assessments
Identity Iam Agent•163L
API Authentication Flow Testing
OAuth2, API key, and HMAC authentication flow testing for security assessments
Api Security Agent•139L